Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/09/2024, 00:17

General

  • Target

    ccb834eb855b7c25788e9f91d9ac65f0N.exe

  • Size

    30KB

  • MD5

    ccb834eb855b7c25788e9f91d9ac65f0

  • SHA1

    80f0f1f50622e7d3ebe301c4c91416ae392aff56

  • SHA256

    a64e7723a28f0adef872926c0c95bb08cadd559981571502371b3f1a6b0b6f8c

  • SHA512

    1aa18fffdfc42eb20b47b6852fa3b0b8bde0ce49e1a1667244b10e9c2ae0cdcacfc50c945d320b1cfdfafa410d416ca575a9ff162dcd6ffd6d144e8aa1b78232

  • SSDEEP

    768:kBT37CPKKdJJBZBZaOAOIB3jM2jMO/7OSBG9GB:CTW7JJB7LD2I2IbS5

Malware Config

Signatures

  • Renames multiple (3372) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccb834eb855b7c25788e9f91d9ac65f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ccb834eb855b7c25788e9f91d9ac65f0N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1846800975-3917212583-2893086201-1000\desktop.ini.tmp

    Filesize

    31KB

    MD5

    9b95027853b8e754dd71d02c961031c1

    SHA1

    cbb6619d95ef8b5d7423f8d0556cb8327dc34b37

    SHA256

    23e322bd6b5c7d26529b9417567f3e3d503da76d8213613224d901570369fbac

    SHA512

    95853bfbfbedf783ae58ab16f4912d361477e25da741ffbcef585c8d39de36c889ad35d02632b31bec762fa2621b8a1680ad0342d891accea98ca4d7af115a73

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.tmp

    Filesize

    40KB

    MD5

    c1697078c765330e508952eae6286bff

    SHA1

    1ec88cebba6bce17ee233fc03dc720cfd019928a

    SHA256

    4d40b3d53de10c3dabb2796d08e7240765cb0c28ef55c9b9965a0dc61b419caa

    SHA512

    a9691ad60b11da81c607d0ee46f71a25a7ddd39e29c0e561ec654f06c67834a28b0fdde31a3d43149c7bd13a95aa507e9333092b73f1a9bf020d888e9da857b9

  • memory/2160-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2160-75-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB